Cyphernomicon Top
Cyphernomicon 8.4

Anonymity, Digital Mixes, and Remailers:
Reasons for Anonymity and Digital Pseudonyms (and Untraceable E-


        Mail)
    8.4.1. (Thre are so many reasons, and this is asked so often, that
            I've collected these various reasons here. More can be added,
            of course.)
    8.4.2. Privacy in general
    8.4.3. Physical Threats
           + "corporate terrrorism" is not a myth: drug dealers and
              other "marginal" businessmen face this every day
             - extortion, threats, kidnappings
           + and many businesses of the future may well be less
              "gentlemanly" than the conventional view has it
             - witness the bad blood between Intel and AMD, and then
                imagine it getting ten times worse
             - and national rivalries, even in ostensibly legal
                businesses (think of arms dealers), may cause more use of
                violence
             + Mafia and other organized crime groups may try to extort
                payments or concessions from market participants, causing
                them to seek the relative protection of anonymous systems
               - with reputations
             + Note that calls for the threatened to turn to the police
                for protection has several problems
               - the activities may be illegal or marginally illegal
                  (this is the reason the Mafia can often get involved
                  and why it may even sometimes have a positive effect,
                  acting as the cop for illegal activities)
               - the police are often too busy to get involved, what
                  with so much physical crime clogging the courts
           - extortion and kidnappings can be done using these very
              techniques of cryptoanarchy, thus causing a kind of arms
              race
           + battered and abused women and families may need the
              equivalent of a "witness protection program"
             + because of the ease of tracing credit card purchases,
                with the right bribes and/or court orders (or even
                hacking), battered wives may seek credit cards under
                pseudonyms
               - and some card companies may oblige, as a kind of
                  politically correct social gesture
               + or groups like NOW and Women Against Rape may even
                  offer their own cards
                 - perhaps backed up by some kind of escrow fund
                 - could be debit cards
           + people who participate in cyberspace businesses may fear
              retaliation or extortion in the real world
             - threats by their governments (for all of the usual
                reasons, plus kickbacks, threats to close them down,
                etcl)
             - ripoffs by those who covet their success...
    8.4.4. Voting
           - We take it for granted in Western societies that voting
              should be "anonymous"--untraceable, unlinkable
           - we don't ask people "What have you got to hide?" or tell
              them "If you're doing something anonymously, it must be
              illegal."
           - Same lesson ought to apply to a lot of things for which the
              government is increasingly demanding proof of identity for
           + Anonymous Voting in Clubs, Organizations, Churches, etc.
             + a major avenue for spreading CA methods: "electronic
                blackballing," weighted voting (as with number of shares)
               + e.g., a corporation issues "voting tokens," which can
                  be used to vote anonymously
                 - or even sold to others (like selling shares, except
                    selling only the voting right for a specific election
                    is cheaper, and many people don't much care about
                    elections)
               + a way to protect against deep pockets lawsuits in, say,
                  race discrimination cases
                 - wherein a director is sued for some action the
                    company takes-anonymity will give him some legal
                    protection, some "plausible deniability"
               + is possible to set up systems (cf. Salomaa) in which
                  some "supervotes" have blackball power, but the use of
                  these vetos is indistinguishable from a standard
                  majority rules vote
                 - i.e., nobody, except the blackballer(s), will know
                    whether the blackball was used!
                 + will the government seek to limit this kind of
                    protocol?
                   - claiming discrimination potential or abuse of
                      voting rights?
             + will Justice Department (or SEC) seek to overturn
                anonymous voting?
               - as part of the potential move to a "full disclosure"
                  society?
               - related to antidiscrimination laws, accountability,
                  etc.
             + Anonymous Voting in Reputation-Based Systems (Journals,
                Markets)
               + customers can vote on products, on quality of service,
                  on the various deals they've been involved in
                 - not clear how the voting rights would get distributed
                 - the idea is to avoid lawsuits, sanctions by vendors,
                    etc. (as with the Bose suit)
               + Journals
                 - a canonical example, and one which I must include, as
                    it combines anonymous refereeing (already standard,
                    in primitive forms), hypertext (links to reviews),
                    and basic freedom of speech issues
                 - this will likely be an early area of use
               - this whole area of consumer reviews may be a way to get
                  CA bandwidth up and running (lots of PK-encrypted
                  traffic sloshing around the various nets)
    8.4.5. Maintenance of free speech
           - protection of speech
           + avoiding retaliation for controversial speech
             - this speech may be controversial, insulting, horrific,
                politically incorrect, racist, sexist, speciesist, and
                other horrible...but remailers and anonymity make it all
                impossible to stop
           - whistleblowing
           + political speech
             - KKK, Aryan Resistance League, Black National Front,
                whatever
             - cf. the "debate" between "Locke" and "Demosthenes" in
                Orson Scott Card's novel, "Ender's Game."
           - (Many of these reasons are also why 'data havens' will
              eventually be set up...indeed, they already exist...homolka
              trial, etc.)
    8.4.6. Adopt different personnas, pseudonyms
    8.4.7. Choice of reading material, viewing habits, etc.
           - to prevent dossiers on this being formed, anonymous
              purchases are needed (cash works for small items, not for
              video rentals, etc.)
           + video rentals
             - (Note: There are "laws" making such releases illegal,
                but...)
           - cable t.v. viewing habits
           + mail-order purchases
             - yes, they need your address to ship to, but there may be
                cutouts that delink (e.g., FedEx might feature such a
                service, someday
    8.4.8. Anonymity in Requesting Information, Services, Goods
           + a la the controversy over Caller ID and 900 numbers: people
              don't want their telephone numbers (and hence identities)
              fed into huge consumer-preference data banks
             - of the things they buy, the videos they rent, the books
                they read. etc. (various laws protect some of these
                areas, like library books, video rentals)
             - subscription lists are already a booming resale
                market...this will get faster and more finely "tuned"
                with electronic subscriptions: hence the desire to
                subscribe anonymously
           + some examples of "sensitive" services that anonymity may be
              desired in (especially related to computers, modems, BBSes)
             + reading unusual or sensitive groups: alt.sex.bondage,
                etc.
               - or posting to these groups!
               - recent controversy over NAMBLA may make such
                  protections more desirable to some (and parallel calls
                  for restrictions!)
             - posting to such groups, especially given that records are
                perpetual and that government agencies read and file
                postings (an utterly trivial thing to do)
             - requesting help on personal issues (equivalent to the
                "Name Witheld" seen so often)
             + discussing controversial political issues (and who knows
                what will be controversial 20 years later when the poster
                is seeking a political office, for example?)
               - given that some groups have already (1991) posted the
                  past postings of people they are trying to smear!
             + Note: the difference between posting to a BBS group or
                chat line and writing a letter to an editor is
                significant
               - partly technological: it is vastly easier to compile
                  records of postings than it is to cut clippings of
                  letters to editors (though this will change rapidly as
                  scanners make this easy)
               - partly sociological: people who write letters know the
                  letters will be with the back issues in perpetuity,
                  that bound issues will preserve their words for many
                  decades to come (and could conceivably come back to
                  haunt them), but people who post to BBSes probably
                  think their words are temporary
               + and there are some other factors
                 - no editing
                 - no time delays (and no chance to call an editor and
                    retract a letter written in haste or anger)
                 + and letters can, and often are, written with the
                    "Name Witheld" signature-this is currently next to
                    impossible to do on networks
                   - though some "forwarding" services have informally
                      sprung up
           + Businesses may wish to protect themselves from lawsuits
              over comments by their employees
             + the usual "The opinions expressed here are not those of
                my employer" may not be enough to protect an employer
                from lawsuits
               - imagine racist or sexist comments leading to lawsuits
                  (or at least being brought up as evidence of the type
                  of "attitude" fostered by the company, e.g., "I've
                  worked for Intel for 12 years and can tell you that
                  blacks make very poor engineers.")
             + employees may make comments that damage the reputations
                of their companies
               - Note: this differs from the current situation, where
                  free speech takes priority over company concerns,
                  because the postings to a BBS are carried widely, may
                  be searched electronically (e.g., AMD lawyers search
                  the UseNet postings of 1988-91 for any postings by
                  Intel employees besmirching the quality or whatever of
                  AMD chips),
             - and so employees of corporations may protect themselves,
                and their employers, by adopting pseudonyms
           + Businesses may seek information without wanting to alert
              their competitors
             - this is currently done with agents, "executive search
                firms," and lawyers
             - but how will it evolve to handle electronic searches?
             + there are some analogies with filings of "Freedom of
                Information Act" requests, and of patents, etc.
               + these "fishing expeditions" will increase with time, as
                  it becomes profitable for companies to search though
                  mountains of electronically-filed materials
                 - environmental impact studies, health and safety
                    disclosures, etc.
                 - could be something that some companies specialize in
           + Anonymous Consultation Services, Anonymous Stringers or
              Reporters
             + imagine an information broker, perhaps on an AMIX-like
                service, with a network of stringers
               + think of the arms deal newsletter writer in Hallahan's
                  The Trade, with his network of stringers feeding him
                  tips and inside information
                 - instead of meeting in secretive locations, a very
                    expensive proposition (in time and travel), a secure
                    network can be used
                 - with reputations, digital pseudonyms, etc.
             + they may not wish their actual identities known
               - threats from employers, former employers, government
                  agencies
               + harassment via the various criminal practices that will
                  become more common (e.g., the ease with which
                  assailants and even assassins can be contracted for)
                 - part of the overall move toward anonymity
               - fears of lawsuits, licensing requirements, etc.
             + Candidates for Such Anonymous Consultation Services
               + An arms deals newsletter
                 - an excellent reputation for accuracy and timely
                    information
                 + sort of like an electronic form of Jane's
                   - with scandals and government concern
                 - but nobody knows where it comes from
                 + a site that distributes it to subscribers gets it
                    with another larger batch of forwarded material
                   - NSA, FBI, Fincen, etc. try to track it down
               + "Technology Insider" reports on all kinds of new
                  technologies
                 - patterned after Hoffler's Microelectronics News, the
                    Valley's leading tip sheet for two decades
                 - the editor pays for tips, with payments made in two
                    parts: immediate, and time-dependent, so that the
                    accuracy of a tip, and its ultimate importance (in
                    the judgment of the editor) can be proportionately
                    rewarded
                 + PK systems, with contributors able to encrypt and
                    then publicly post (using their own means of
                    diffusion)
                   - with their messages containing further material,
                      such as authentications, where to send the
                      payments, etc.
               + Lundberg's Oil Industry Survey (or similar)
                 - i.e., a fairly conventional newsletter with publicly
                    known authors
                 - in this case, the author is known, but the identities
                    of contributors is well-protected
               + A Conspiracy Newsletter
                 - reporting on all of the latest theories of
                    misbehavior (as in the "Conspiracies" section of this
                    outline)
                 + a wrinkle: a vast hypertext web, with contributors
                    able to add links and nodes
                   + naturally, their real name-if they don't care about
                      real-world repercussions-or one of their digital
                      pseudonyms (may as well use cryptonyms) is attached
                     + various algorithms for reputations
                       - sum total of everything ever written, somehow
                          measured by other comments made, by "voting,"
                          etc.
                       - a kind of moving average, allowing for the fact
                          that learning will occur, just as a researcher
                          probably gets better with time, and that as
                          reputation-based systems become better
                          understood, people come to appreciate the
                          importance of writing carefully
               + and one of the most controversial of all: Yardley's
                  Intelligence Daily
                 - though it may come out more than daily!
                 + an ex-agent set this up in the mid-90s, soliciting
                    contributions via an anonymous packet-switching sysem
                   - refined over the next couple of years
                   - combination of methods
                 - government has been trying hard to identify the
                    editor, "Yardley"
                 - he offers a payback based on value of the
                    information, and even has a "Requests" section, and a
                    Classifed Ad section
                 - a hypertext web, similar to the Conspiracy Newsletter
                    above
                 + Will Government Try to Discredit the Newsletter With
                    False Information?
                   - of course, the standard ploy in reputation-based
                      systems
                   + but Yardley has developed several kinds of filters
                      for this
                     - digital pseudonyms which gradually build up
                        reputations
                     - cross-checking of his own sort
                     - he even uses language filters to analyze the text
                   + and so what?
                     - the world is filled with disinformation, rumors,
                        lies, half-truths, and somehow things go on....
               + Other AMIX-like Anonymous Services
                 + Drug Prices and Tips
                   - tips on the quality of various drugs (e.g.,
                      "Several reliable sources have told us that the
                      latest Maui Wowie is very intense, numbers
                      below...")
                   + synthesis of drugs (possibly a separate
                      subscription)
                     - designer drugs
                     - home labs
                     - avoiding detection
                 + The Hackers Daily
                   - tips on hacking and cracking
                   - anonymous systems themselves (more tips)
                 - Product evaluations (anonymity needed to allow honest
                    comments with more protection against lawsuits)
             + Newspapers Are Becoming Cocerned with the Trend Toward
                Paying for News Tips
               - by the independent consultation services
               - but what can they do?
               + lawsuits are tried, to prevent anonymous tips when
                  payments are involved
                 - their lawyers cite the tax evasion and national
                    security aspects
           + Private Data Bases
             + any organization offering access to data bases must be
                concerned that somebody-a disgruntled customer, a
                whistleblower, the government, whoever-will call for an
                opening of the files
               - under various "Data Privacy" laws
               - or just in general (tort law, lawsuits, "discovery")
             + thus, steps will be taken to isolate the actual data from
                actual users, perhaps via cutouts
               + e.g., a data service sells access, but subcontracts out
                  the searches to other services via paths that are
                  untraceable
                 + this probably can't be outlawed in general-though any
                    specific transaction might later be declared illegal,
                    etc., at which time the link is cut and a new one is
                    established-as this would outlaw all subcontracting
                    arrangements!
                   - i.e., if Joe's Data Service charges $1000 for a
                      search on widgets and then uses another possibly
                      transitory (meaning a cutout) data service, the
                      most a lawsuit can do is to force Joe to stop using
                      this untraceble service
                   - levels of indirection (and firewalls that stop the
                      propagation of investigations)
           + Medical Polls (a la AIDS surveys, sexual practices surveys,
              etc.)
             + recall the method in which a participant tosses a coin to
                answer a question...the analyst can still recover the
                important ensemble information, but the "phase" is lost
               - i.e., an individual answering "Yes" to the question
                  "Have you ever had xyz sex?" may have really answered
                  "No" but had his answer flipped by a coin toss
             + researchers may even adopt sophisticated methods in which
                explicit diaries are kept, but which are then transmitted
                under an anonymous mailing system to the researchers
               - obvious dangers of authentication, validity, etc.
           + Medical testing: many reasons for people to seek anonymity
             - AIDS testing is the preeminent example
             - but also testing for conditions that might affect
                insurablity or employment (e.g.,  people may go to
                medical havens in Mexico or wherever for tests that might
                lead to uninsurability should insurance companies learn
                of the "precondition")
             + except in AIDS and STDs, it is probably both illegal and
                against medical ethics to offer anonymous consultations
               - perhaps people will travel to other countries
    8.4.9. Anonymity in Belonging to Certain Clubs, Churches, or
            Organizations
           + people fear retaliation or embarassment should their
              membership be discovered, now or later
             - e.g., a church member who belongs to controversial groups
                or clubs
           - mainly, or wholly, those in which physical contact or other
              personal contact is not needed (a limited set)
           - similar to the cell-based systems described elsewhere
           + Candidates for anonymous clubs or organizations
             - Earth First!, Act Up, Animal Liberation Front, etc.
             - NAMBLA and similar controversial groups
           - all of these kinds of groups have very vocal, very visible
              members, visible even to the point of seeking out
              television coverage
           - but there are probably many more who would join these
              groups if there identities could be shielded from public
              group, for the sake of their careers, their families, etc.
           + ironically, the corporate crackdown on outside activities
              considered hostile to the corporation (or exposing them to
              secondary lawsuits, claims, etc.) may cause greater use of
              anonymous systems
             - cell-based membership in groups
           - the growth of anonymous membership in groups (using
              pseudonyms) has a benefit in increasing membership by
              people otherwise afraid to join, for example, a radical
              environmental group
   8.4.10. Anonymity in Giving Advice or Pointers to Information
           - suppose someone says who is selling some illegal or
              contraband product...is this also illegal?
           - hypertext systems will make this inevitable
   8.4.11. Reviews, Criticisms, Feedback
           - "I am teaching sections for a class this term, and tomorrow
              I am going to: 1) tell my students how to use a remailer,
              and 2) solicit anonymous feedback on my teaching.
              
              "I figure it will make them less apprehensive about making
              honest suggestions and comments (assuming any of them
              bother, of course)." [Patrick J. LoPresti
              patl@lcs.mit.edu, alt.privacy.anon-server, 1994-09-08]
   8.4.12. Protection against lawsuits, "deep pockets" laws
           + by not allowing the wealth of an entity to be associated
              with actions
             - this also works by hiding assets, but the IRS frowns on
                that, so unlinking the posting or mailing name with
                actual entity is usually easier
           + "deep pockets"
             - it will be in the interest of some to hide their
                identities so as to head off these kinds of lawsuits
                (filed for whatever reasons, rightly or wrongly)
             - postings and comments may expose the authors to lawsuits
                for libel, misrepresentation, unfair competition, and so
                on (so much for free speech in these beknighted states)
             + employers may also be exposed to the same suits,
                regardless of where their employees posted from
               - on the tenuous grounds that an employee was acting on
                  his employer's behalf, e.g., in defending an Intel
                  product on Usenet
             - this, BTW, is another reason for people to seek ways to
                hide some of their assets-to prevent confiscation in deep
                pockets lawsuits (or family illnesses, in which  various
                agencies try to seize assets of anybody they can)
             - and the same computers that allow these transactions will
                also allow more rapid determination of who has the
                deepest pockets!
           + by insulating the entity from repercussions of "sexist" or
              "racist" comments that might provoke lawsuits, etc.
             - (Don't laugh--many companies are getting worried that
                what their employees write on Usenet may trigger lawsuits
                against the companies.)
           + many transactions may be deemed illegal in some
              jursidictions
             + even in some that the service or goods provider has no
                control over
               - example: gun makers being held liable for firearms
                  deaths in the District of Columbia (though this was
                  recently cancelled)
             - the maze of laws may cause some to seek anonymity to
                protect themselves against this maze
           + Scenario: Anonymous organ donor banks
             + e.g., a way to "market" rare blood types, or whatever,
                without exposing one's self to forced donation or other
                sanctions
               - "forced donation" involves the lawsuits filed by the
                  potential recipient
               - at the time of offer, at least...what happens when the
                  deal is consummated is another domain
             - and a way to avoid the growing number of government
                stings
   8.4.13. Journalism and Writing
           + writers have had a long tradtion of adopting pseudonyms,
              for a variety of reasons
             - because they couldn't get published under their True
                Names, because they didn't _want_ their true names
                published, for the fun of it, etc.
             - George Elliot, Lewis Carroll, Saki, Mark Twain, etc.
           - reporters
           + radio disc jockeys
             - a Cypherpunk who works for a technology company uses the
                "on air personna" of "Arthur Dent" ("Hitchhiker's Guide")
                for his part-time radio broadcasting job...a common
                situation, he tells me
           + whistleblowers
             - this was an early use
           + politically sensitive persons
             - "
             + I subsequently got myself an account on anon.penet.fi as
                the "Lt.
               - Starbuck" entity, and all later FAQ updates were from
                  that account.
               - For reasons that seemed important at the time, I took
                  it upon myself to
               - become the moderator/editor of the FAQ."
               - <an54835@anon.penet.fi, 4-3-94, alt.fan.karla-homolka>
           + Example: Remailers were used to skirt the publishing ban on
              the Karla Homolka case
             - various pseudonymous authors issued regular updates
             - much consternation in Canada!
           + avoidance of prosecution or damage claims for writing,
              editing, distributing, or selling "damaging" materials is
              yet another reason for anonymous systems to emerge: those
              involved in the process will seek to immunize themselves
              from the various tort claims that are clogging the courts
             - producers, distributors, directors, writers, and even
                actors of x-rated or otherwise "unacceptable" material
                may have to have the protection of anonymous systems
             - imagine fiber optics and the proliferation of videos and
                talk shows....bluenoses and prosecutors will use "forum
                shopping" to block access, to prosecute the producers,
                etc.
   8.4.14. Academic, Scientific, or Professional
           - protect other reputations (professional, authorial,
              personal, etc.)
           - wider range of actions and behaviors (authors can take
              chances)
           - floating ideas out under pseudonyms
           - later linking of these pseudonyms to one's own identity, if
              needed (a case of credential transfer)
           -  floating unusual points of view
           - Peter Wayner writes: "I would think that many people who
              hang out on technical newsgroups would be very familiar
              with the anonymous review procedures practiced by academic
              journals. There is some value when a reviewer can speak
              their mind about a paper without worry of revenge. Of
              course everyone assures me that the system is never really
              anonymous because there are alwys only three or four people
              qualified to review each paper. :-) ....Perhaps we should
              go out of our way to make anonymous, technical comments
              about papers and ideas in the newsgroups to fascilitate the
              development of an anonymous commenting culture in
              cypberspace." [Peter Wayner, 1993-02-09]
   8.4.15. Medical Testing and Treatment
           - anonymous medical tests, a la AIDS testing
   8.4.16. Abuse, Recovery
           + personal problem discussions
             - incest, rape, emotional, Dear Abby, etc.
   8.4.17. Bypassing of export laws
           - Anonymous remailers have been useful for bypassing the
              ITARs...this is how PGP 2.6 spread rapidly, and (we hope!)
              untraceably from MIT and U.S. sites to offshore locations.
   8.4.18. Sex groups, discussions of controversial topics
           - the various alt.sex groups
           - People may feel embarrassed, may fear repercussions from
              their employers, may not wish their family and friends to
              see their posts, or may simply be aware that Usenet is
              archived in many, many places, and is even available on CD-
              ROM and will be trivially searchable in the coming decades
           + the 100% traceability of public postings to UseNet and
              other bulletin boards is very stifling to free expression
              and becomes one of the main justifications for the use of
              anonymous (or pseudononymous) boards and nets
             - there may be calls for laws against such compilation, as
                with the British data laws, but basically there is little
                that can be done when postings go to tens of thousands of
                machines and are archived in perpetuity by many of these
                nodes and by thousands of readers
             - readers who may incorporate the material into their own
                postings, etc. (hence the absurdity of the British law)
   8.4.19. Avoiding political espionage
           + TLAs in many countries monitor nearly all international
              communications (and a lot of domestic communications, too)
             - companies and individuals may wish to avoid reprisals,
                sanctions, etc.
             - PGP is reported to be in use by several dissident groups,
                and several Cypherpunks are involved in assisting them.
             - "...one legitimate application is to allow international
                political groups or companies to exchange authenticated
                messages without being subjected to the risk of
                espionage/compromise by a three letter US agency, foreign
                intelligence agency, or third party." [Sean M. Dougherty,
                alt.privacy.anon-server, 1994-09-07]
   8.4.20. Controversial political discussion, or membership in
            political groups, mailing lists, etc.
           + Recall House UnAmerican Activities Committee
             - and it's modern variant: "Are you now, or have you ever
                been, a Cypherpunk?"
   8.4.21. Preventing Stalking and Harassment
           - avoid physical tracing (harassment, "wannafucks," stalkers,
              etc.)
           - women and others are often sent "wannafuck?" messages from
              the males that outnumber them 20-to-1 in many newsgroups--
              pseudonyms help.
           - given the ease with which net I.D.s can be converted to
              physical location information, many women may be worried.
           + males can be concerned as well, given the death threats
              issued by, for example, S. Boxx/Detweiler.
             - as it happens, S. Boxx threatened me, and I make my home
                phone number and location readily known...but then I'm
                armed and ready.
   8.4.22. pressure relief valve: knowing one can flee or head for the
            frontier and not be burdened with a past
           - perhaps high rate of recidivism is correlated with this
              inability to escape...once a con, marked for life
              (certainly denied access to high-paying jobs)
   8.4.23. preclude lawsuits, subpoenas, entanglement in the legal
            machinery
   8.4.24. Business Reasons
           + Corporations can order supplies, information, without
              tipping their hand
             - the Disney purchase of land, via anonymous cutouts (to
                avoid driving the price way up)
             - secret ingredients (apocryphally, Coca Cola)
           - avoiding the "deep pockets" syndrome mentioned above
           - to beat zoning and licensing requirements (e.g., a certain
              type of business may not be "permitted" in a home office,
              so the homeowner will have to use cutouts to hide from
              enforcers)
           - protection from (and to) employers
           + employees of corporations may have to do more than just
              claim their view are not those of their employer
             - e.g., a racist post could expose IBM to sanctions,
                charges
             + thus, many employees may have to further insulate their
                identities
               - blanc@microsoft.com is now
                  blanc@pylon.com...coincidence?
           + moonlighting employees (the original concern over Black Net
              and AMIX)
             - employers may have all kinds of concerns, hence the need
                for employees to hide their identities
             - note that this interects with the licensing and zoning
                aspects
           - publishers, service-prividers
           + Needed for Certain Kinds of Reputation-Based Systems
             + a respected scientist may wish to float a speculative
                idea
               - and be able to later prove it was in fact his idea
   8.4.25. Protection against retaliation
           - whistleblowing
           + organizing boycotts
             - (in an era of laws regulating free speech, and "SLAPP"
                lawsuits)
           + the visa folks (Cantwell and Siegel) threatening those who
              comment with suits
             - the law firm that posted to 5,000 groups....also raises
                the issue again of why the Net should be subsidized
           - participating in public forums
           + as one person threatened with a lawsuit over his Usenet
              comments put it:
             - "And now they are threatening me. Merely because I openly
                expressed my views on their extremely irresponsible
                behaviour. Anyways, I have already cancelled the article
                from my site and I publicly appologize for posting it in
                the first place. I am scared :) I take all my words back.
                Will use the anonymous service next time :)"
   8.4.26. Preventing Tracking, Surveillance, Dossier Society
           + avoiding dossiers in general
             - too many dossiers being kept; anonymity allows people to
                at least hold back the tide a bit
           + headhunting, job searching, where revealing one's identity
              is not always a good idea
             - some headhunters are working for one's current employer!
             - dossiers
   8.4.27. Some Examples from the Cypherpunks List
           + S, Boxx, aka Sue D. Nym, Pablo Escobar, The Executioner,
              and an12070
             - but Lawrence Detweiler by any other name
             + he let slip his pseudonym-true name links in several ways
               - stylistic cues
               - mention of things only the "other" was likely to have
                  heard
               + sysops acknowledged certain linkings
                 - *not* Julf, though Julf presumably knew the identity
                    of "an12070"
           + Pr0duct Cypher
             - Jason Burrell points out: "Take Pr0duct Cypher, for
                example. Many believe that what (s)he's doing(*) is a
                Good Thing, and I've seen him/her using the Cypherpunk
                remailers to conceal his/her identity....* If you don't
                know, (s)he's the person who wrote PGPTOOLS, and a hack
                for PGP 2.3a to decrypt messages written with 2.6. I
                assume (s)he's doing it anonymously due to ITAR
                regulations." [J.B., 1994-09-05]
           + Black Unicorn
             - Is the pseudonym of a Washington, D.C. lawyer (I think),
                who has business ties to conservative bankers and
                businessmen in Europe, especially Liechtenstein and
                Switzerland. His involvement with the Cypherpunks group
                caused him to adopt this pseudonym.
             - Ironically, he got into a battle with S. Boxx/Detweiler
                and threated legal action. This cause a rather
                instructive debate to occur.
  

Next Page: 8.5 Untraceable E-Mail
Previous Page: 8.3 Anonymity and Digital Pseudonyms

By Tim May, see README

HTML by Jonathan Rochkind